Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data leakage
biblio
A Safe Approach to Sensitive Dropout Data Collection Systems by Utilizing Homomorphic Encryption
Submitted by grigby1 on Fri, 08/11/2023 - 10:33am
sensitive data
Dropout
Homomorphic encryption
Technological innovation
data leakage
Manuals
Databases
data privacy
Scalability
Computer hacking
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Data collection
biblio
PIDS: An Essential Personal Information Detection System for Small Business Enterprise
Submitted by grigby1 on Thu, 02/24/2022 - 11:22am
security
Scalability
pubcrawl
Privacy Policies
Privacy Agent
personal information
mechatronics
Human behavior
Data protection
Data mining
data leakage
Costs
collaboration
Business
biblio
LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables Emission
Submitted by grigby1 on Mon, 12/20/2021 - 12:18pm
Human behavior
Virtual machining
Resiliency
resilience
pubcrawl
Portable computers
Metrics
Meters
malware
LAN
Air gaps
exfiltration
Ethernet
electromagnetic
data leakage
covert channels
Computers
composability
Communication cables
air-gap
biblio
Toward Pinpointing Data Leakage from Advanced Persistent Threats
Submitted by aekwall on Mon, 12/20/2021 - 11:22am
Human behavior
leakage auditing
fingerprint
Digital Forensics
data leakage
APT
advanced persistent threat
Forensics
Fingerprint recognition
Organizations
Resiliency
Metrics
pubcrawl
Databases
Conferences
Computer hacking
Scalability
Big Data
biblio
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs
Submitted by grigby1 on Tue, 08/31/2021 - 10:04am
insider attacks
static analysis
Resiliency
resilience
relational database security
pubcrawl
Performance analysis
Monitoring
Metrics
Anomaly Detection
Human behavior
Hidden Markov models
Databases
database
data leakage
composability
application profile
biblio
Big Data Encryption Technology Based on ASCII And Application On Credit Supervision
Submitted by grigby1 on Mon, 12/28/2020 - 11:39am
data utilization
user privacy
user payment information
Scalability
Resiliency
resilience
pubcrawl
Metrics
market supervision business
Licenses
Internet of Things
Human behavior
financial data processing
Electronic mail
electronic data interchange
Desensitization
Artificial Intelligence
data privacy
data leakage
Data Governance
data desensitization technology
Cryptography
Cross-Platform
credit supervision application
Credit Supervision
credit construction
Conferences
BIGDATA
big data privacy
Big Data encryption technology
Big Data
ASCII
biblio
A Probability based Model for Big Data Security in Smart City
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
security of data
IoT
organisational data
Organizations
personal data
probability
probability based model
pubcrawl
resilience
Resiliency
security
highly sensitive data
sensitive data sharing
smart applications
smart cities
Smart City
smart city critical data
smart city data
smart technologies
smart traffic management system
transport data
Trusted Computing
Data Leakage Detection
Big Data
big data security
bigraph
Computational modeling
Computing Theory
crisis response
critical data security
data analysis
Data Analytics
data leakage
Analytical models
Data models
data objects
data privacy
disaster resilience
economic data
emergency management
energy data
environment data
graph theory
Guilt Model
biblio
Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory
Submitted by grigby1 on Thu, 07/16/2020 - 11:18am
pubcrawl
Virtualization
Virtual machining
time-covert channels
time concealed channel technology
shared memory time covert channels
shared memory systems
shared memory
security of data
security issues
security
Scalability
Resiliency
resilience
Analytical models
interference methods
Interference
Entropy
data leakage
covert channels
covert channel interference
covert channel detection
covert channel
Compositionality
composability
cloud platform
cloud computing platform
Cloud Computing
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
SecureCSearch: Secure Searching in PDF Over Untrusted Cloud Servers
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
Keyword search
Secure File Sharing
resilience
Resiliency
pubcrawl
untrusted cloud servers
specific files
Shamir's Secret Sharing
Shamir Secret Sharing scheme
SecureCSearch
secure searching
Searching
Portable document format
PDF file
PDF
keyword search operations
Cryptography
information retrieval
incurs minimal computation cost
hacks
encrypted shares
encrypted PDF files
encrypted domain
encrypted cloud data
data leakage
cloud
data storage
storage management
Servers
Cloud Computing
security
encryption
1
2
next ›
last »